Tag: OT

  • Considerations for purchasing OT remote access solutions

    Considerations for purchasing OT remote access solutions

    Remote access solutions for OT environments are purchased either by plant operators, who usually use a variety of suppliers for control systems and machines in their plants, or by manufacturers of industrial automation technology and machine builders. Of course, there are conflicts of interest here: machine builders would prefer all their customers to use the […]

  • Shaping Information Security Together – Experiences of a CISO

    Shaping Information Security Together – Experiences of a CISO

    Marcel Lehner Marcel Lehner has been shaping the cyber, information and IT security industry for over 20 years – in line with the motto “Shaping information security together”. For the past 10 years, he has passionately led the internal cyber security organization of Mayr-Melnhof Karton AG as Chief Information Security Officer (CISO). In this role, […]

  • Zero trust in operational technology (OT): issues and some solution approaches

    Zero trust in operational technology (OT): issues and some solution approaches

    Zero trust has existed as a relatively new objective (and new term replacing “least privilege”) for some years in the office IT context. In essence, zero trust involves fundamentally challenging the trustworthiness of users, devices, and applications by requiring authentication every time access or a session takes place. Typically, this check is conducted via a […]

  • The world of cyber insurance – constantly changing

    The world of cyber insurance – constantly changing

    Michael Winte Michael Winte is the head of the Cyber, Technology & Crime division of Funk, an international insurance broker and risk consultant. In the following interview, he reports on changes and developments in the insurance market, with advice and tips on incident prevention and cyber policies. He also offers a prediction on how cyber […]

  • “Cybersecurity has to come from the inside.”

    “Cybersecurity has to come from the inside.”

    Sarah Fluchs Following her mechanical engineering studies, Sarah Fluchs embarked on a career in cybersecurity. Today, she is CTO at admeritia and co-authored the recently published “Top 20 Secure Coding Practices” for PLC programming. In our exclusive interview, she talks about particularly difficult challenges in her work, technical developments in the area of OT/IoT security, […]

  • OT Security for small and medium-sized enterprises (SMEs)

    OT Security for small and medium-sized enterprises (SMEs)

    Ralph Langner Ralph Langner is the founder and CEO of Langner Group. Since 1988, he has gained hands-on experience in cybersecurity issues at power plants, water treatment plants, nuclear facilities, food and beverage manufacturers, automotive plants, steel mills, and many other sectors. Langner is considered a world-leading expert in cyber defense and has received worldwide […]

  • Return on Security Invest: Top-down and Best-Practice

    Return on Security Invest: Top-down and Best-Practice

    Klaus Jochem Klaus Jochem has more than 30 years of IT experience. In 2014, he joined the Bayer Information Security Program, where he was responsible for secure application architecture. He has been a freelance consultant for IT and OT security since July 2019. Klaus Jochem, how long have you worked in cybersecurity and OT security, […]

  • OT-Security: “Those two controls could have prevented most of the attacks”

    OT-Security: “Those two controls could have prevented most of the attacks”

    Dale Peterson [Part 2/2] Dale Peterson is the co-founder and managing director of Digital Bond Inc. He has many years of experience in the IT security sector and is the creator and program chair of S4 Events, the world’s largest conference for industrial cyber security. Here you can find the first part of our interview […]

  • “A special department is needed for OT security”

    “A special department is needed for OT security”

    Justin Searle Together with Justin Searle, we talked about the process and the challenges of performing real pentests in an industrial environment and for IoT products. He also talks about specific trends and technologies for cybersecurity. He is the Director of ICS Security at InGuardians and Senior Instructor for the SANS Institute. Dear Justin, thank […]

  • Challenges in safeguarding global production plants

    Challenges in safeguarding global production plants

    Dr. Thorsten Widmer Dr. Thorsten Widmer is responsible for the digitization of Bosch plants worldwide. He spoke with Simeon Mussler, COO Bosch CyberCompare, about the weak points and challenges he faces in protecting 250+ Bosch plants and a wide range of development sites. One major challenge is ensuring that protective measures can be taken at […]